Richmond Seminar: Cloud, Security, Storage/Backup, Mobility, ContainersEvent on 2017-03-28 07:30:00
This comprehensive seminar covers the increasingly related topics of IT security/compliance, network infrastructure, storage/backup, mobility, private/public/hybrid cloud, containers, OpenStack and DevOps. Scroll down to see the full agenda and click on links to see company information and speakers' biographies, who deliver concise, technical, educational and non-salesy talks. There are Microsoft and Google keynotes, plus subject matter experts presenting from VMware, Dell EMC, Red Hat, Nutanix, Zerto and IGEL.Content is pre-approved by Angelbeat and past attendees to maximize learning; click here to download presentation guidelines that are followed by all participants, which makes the program so worthwhile for IT Directors, Security Analysts, Enterprise Architects, Network & System Administrators, Data Center/Storage/Infrastructure Managers, CISO/CIO's, etc.As one Walmart attendee states, "Of all the seminars I attend, your format is by far the best. Brief informative talks from vendors, followed by one-on-one time at their booth to find out more. I am out of the office for less than a day yet I have access to all the different solutions. This year I will follow up with two vendors." As another IT Director commented, "Thanks for hosting a very informative meeting with vendors that tied in well; it was an integrated picture of technologies that work together to create a complete infrastructure solution for the workplace."Join your peers from Genworth, CarMax, NewMarket, Bon Secours, Chesterfield County, Commonwealth of Virginia, Virginia Premier Health, Federal Reserve Bank, Virginia Lottery, Eastern Virginia Bankshares/EVB, Bank of America, City of Richmond, City of Newport News, US Navy, US Coast Guard, University of Richmond, ChildFund International and many more organizations who are confirmed attendees.Every attendee receives meals including breakfast and lunch, free parking, complimentary Wi-Fi, plus 4 CPE credit hours towards your CISSP or other certification. There are drawings for gift cards and other prizes at the end.Agenda7:30 – 8:40: Registration Begins, Breakfast Served, Exhibit Area Open with Product Demonstrations, Time For Peer Networking/Interaction8:40 – 9:00: The Enterprise Immune System – A New Approach to Cyber Defense with DarktraceFast-evolving cyber-threats call for a change in the way we protect our most critical information assets, in a digital world more interconnected than ever. Understand from Darktrace how new self-learning technology, known as the “Enterprise Immune System,” marks a fundamental transition in cyber defense, allowing organizations to gain indispensable visibility into their network, and detect emerging cyber-threats that bypass traditional security controls.Thanks to fundamental advances in mathematics and unsupervised machine learning developed at the University of Cambridge, UK, Darktrace's technology is capable of learning what is normal and abnormal within an organization, detecting genuine behavioral anomalies, without using rules or signatures. More than 250 organizations across the world rely on its Enterprise Immune System to defend against novel cyber-threats, including insider threat, and protect themselves in today’s changing threat landscape.Austin Eppstein, one of Darktrace's top cyber security experts, will cover the following subjects during this session: – Learn why “immune system” technologies represent a fundamental innovation for cyber defense – Discover how to apply machine learning and mathematics to detect advanced, internal threats – Understand how to gain 100% network visibility to investigate emerging anomalies in real time – Hear real-world examples of threats detected by the Enterprise Immune System9:00 – 9:15: Manage risk, not data or systems, with cloud-based automated security from NormShieldCyber threats are unrelenting. Your security team is faced with an overwhelming amount of data as they race to find and fix vulnerabilities. Prioritization is difficult, informed decisions are nearly impossible.Candan Bolukbas, NormShield Co-Founder & CTO, will show you how hackers conduct reconnaissance and discover weaknesses in your security infrastructure without ever touching your network. And, more importantly, how you can stop them cold. A security polymath and certified ethical hacker, Candan will share the tools of trade and you will learn how:- Hackers leverage publicly available information to discover your security weaknesses- you can use the same techniques hackers use to discover your security weaknesses and fix them – before hackers find them- CISOs and other executives can have continuous visibility to the security posture and always make informed decisions- IT security teams can prioritize their tasks and focus on fixing the riskiest vulnerabilities The NormShield cloud platform automates finding vulnerabilities, prioritizes them and provides actionable intelligence. You reduce risk as never before possible, and at an affordable price. With NormShield, CISOs can make informed decisions with continuous visibility and measurable performance. Security teams take swift action with prioritized tasks and auto-assigned tickets. 9:15 – 9:35: From Traditional to Next-Generation: Demystifying Hyperconvergence and Enterprise Clouds with NutanixAs enterprises look beyond traditional IT workloads including cloud-native applications and DevOps, they should consider how technologies such as software-defined infrastructure and cloud can drive real-world benefits.During this informative session featuring Brian Atkinson of Nutanix, learn how IT can move away from traditional environments to hyperconverged infrastructure and onward to Enterprise Clouds. These new platforms can handle all your challenging applications and business needs, with clear agility, productivity and availability/security benefits. At the end of this session, you'll:- Acquire proven strategies for delivering frictionless IT services while retaining the precise control your business needs- Understand new capabilities that tear down IT silos and unify the technology stack- Learn best practices in virtualization, application design and cloud technologies9:35 – 9:55: All-Flash Primary Storage from Dell EMCNow more than ever, business is all about speed, flexibility and reliability, and Flash is the high-octane storage media behind it.An All-Flash Array, also referred to as a SSA or Solid State Array, is data storage that contains multiple Flash memory drives. All-Flash storage contains no moving parts, which means significantly less heat generated, less power utilized, and less maintenance. From a functional standpoint, All-Flash technology provides vastly superior performance: fewer spikes in latency, better disaster recovery, support of real-time analytics, much faster data transfer rates, and the ability to free IT staff to focus on other tasks.During this informative and technical talk featuring Dell EMC and Mavenspire, you will learn how Flash Storage can be deployed within your existing data center infrastructure.9:55 – 10:15 IT Resilience, Disaster Recovery, Business Continuity, Backup/Archiving with ZertoIn today's hyper-connected, always-on world, it is mandatory your employees and customers have 24/7 access to the applications, data and services they need, without interruption, downtime or delay. But when extreme weather and/or technical problems disrupt operations, it can be extremely challenging to recover, with data at rest, in use and/or in motion, stored onsite or offsite, on private, public and/or hybrid clouds. Fortunately, Zerto has a solution.Zerto is committed to helping enterprises embrace IT Resilience with a simple, scalable solution that future-proofs technology initiatives. Charles Sawyer will discuss how businesses can gain the confidence to withstand any disruption, incorporate new technology and meet changing business priorities with ease.Some of the specific capabilities with Zerto's Virtual Replication that will be covered include:- Seamless application mobility and portability, so organizations can easily leverage resources across public, private and hybrid clouds.- Automated replication and recovery with point-in-time journaling, so businesses can recover from anything, including ransomware, in minutes.- Freedom from hardware and hypervisor lock-in, so enterprises can leverage the best technology at the best prices.10:15 – 10:35: Get Control of your End Points in a Cloud-Driven Virtual World with IGELOrganizations generally have a comprehensive strategy for servers, storage, networking and applications, yet often overlook the endpoint. In this informative session featuring Joshua Robinson, Presales Engineer at IGEL, you will learn why and how to develop your endpoint strategy. Specific topics include: – Gain insight into options available for existing desktop, laptop and thin client assets – Learn what to look for in enterprise device management – Explore the capabilities and limitations of a virtual desktop/application solution- Understand the costs associated with thin client devices Coffee/Snack Break, Exhibit Area Open, Peer Networking, Product Demonstrations11:05 – 11:40: Linux, Windows Server and Hyper-V Containers: What They Are, Which One to Use, Why and How, plus Integration with Azure Private/Public/Hybrid Cloud, with MicrosoftA container is an isolated and portable operating environment. It provides a mechanism for IT to deploy services in a portable, repeatable and predictable manner. Container technology is the next evolution in virtualization, and in addition to Linux, Windows now also offers two different types of containers for addressing various business needs.In this session Dan Stolts, world renown Technical Evangelist at Microsoft and a dynamic/engaging presenter, will examine the similarities and differences between a container and a virtual machine, review the requirements and walk through the processes and essential operations of enabling, creating, deploying and managing Linux and Windows containers and resources. Mr. Chou will also evaluate when to use which containers, why and how? For those who are new to containers, his delivery serves as a jumpstart to accelerate your learning of containers. If you have already had some experience on Linux containers, his session familiarizes you with the specifics on Windows containers and helps bridge and extend your skills for bringing business value to both Linux and Windows communities.Mr. Stolts will conclude this session by highlighting the top five new features in Microsoft's Azure cloud platform for 2017, and how to integrate your organization's public/private/hybrid cloud and container strategies. Lots of valuable content for infrastructure, data center and DevOps professionals.11:40 – 12:15: Google Cloud PlatformThe Google Cloud Platform enables organizations of all sizes to build, test and deploy applications on Google’s highly-scalable and reliable infrastructure, choosing from computing, storage and/or application services for your web, mobile and/or backend solutions. Leo Kahng, a top enterprise and technology strategist at Google, will discuss how and why to use this innovative platform, covering the following items:Run on Google’s infrastructure: Build on the same infrastructure that allows Google to return billions of search results in milliseconds, serve 6 billion hours of YouTube video per month and provide storage for 425 million Gmail users.Mix and match services: Virtual machines. Managed platform. Blob storage. Block storage. NoSQL datastore. MySQL database. Big Data analytics. Google Cloud Platform has all the services your application architecture needs.Performance you can count on: Every millisecond of latency matters. Google’s compute infrastructure gives you consistent CPU, memory and disk performance; its network and edge cache serve responses rapidly to your users across the world.Focus on your product: Rapidly develop, deploy and iterate your applications without worrying about system administration. Google manages your application, database and storage servers so you don’t have to.Scale to millions of users: Applications hosted on Cloud Platform can automatically scale up to handle the most demanding Internet-scale workloads and scale down when traffic subsides. You pay only for what you use.Get the support you need: With our worldwide community of users, partner ecosystem and premium support packages, Google provides a full range of resources to help you get started and grow.12:15 – 12:35: VMware's Networking and Security NSX Platform, for the Software-Defined Data Center (SDDC)VMware NSX is the Network Virtualization and Security Platform for the Software-Defined Data Center (SDDC). By bringing the operational model of a virtual machine to your data center network, you can transform the economics of network and security operations. NSX lets you treat your physical network as a pool of transport capacity, with network and security services attached to VMs with a policy-driven approach.As organizations go down this path towards a completely Software Defined Enterprise (SDE), VMware and Mavenspire will discuss these main components/features/benefits of NSX:Agility and Streamlined Operations, plus DevOps:As with server virtualization, NSX network virtualization treats your physical network as a pool of transport capacity, with services attached to workloads using a policy-driven approach. Some specific benefits are:- Reduce the time to provision multi-tier networking and security services to minutes, by creating virtual networks, with each network customized for supported workloads and isolated from other virtual networks.- Leverage a new operational approach to networking as you programmatically create, provision, snapshot, delete and restore complex software-based networks.- Develop, test and deploy new applications faster – DevOps functionality – by aligning network, security, compute and storage provisioning.Security and Micro-Segmentation:NSX micro-segmentation provides these security benefits/functionality:- Isolation, with no communication across unrelated networks- Segmentation, offering controlled communication within a network- Fine-grained policies, enabling firewall controls at the level of the virtual NIC.- Automation, as policies are automatically applied when a virtual machine spins up, moved during migration and then removed after deprovisioning, eliminating the problem of stale firewall rules.- Integration with leading third party products through security tags.Platform for Advanced NetworkingChange in traditional networks can be slow and error-prone, making them poorly suited to fluctuating data center demands. By contrast, virtual NSX networks can be configured dynamically and automatically, with new services – virtual or physical – added as needed. Manual reconfiguration of physical network devices is eliminated, plus you can build advanced workflows to automate provisioning of networking and security, including switching, routing, firewalling, and load balancing.Lunch is Served1:20 – 1:40: Optimizing Website Performance and Application Delivery with Microservices Architecture from NGINXAs enterprise architecture transitions from Mode 1/Monolithic into Mode 2/Microservices they realize that software Application Delivery Controllers offer the most flexibility. With this particular application modernization effort there are issues to tackle such as service discovery, load balancing, performance and security.Shaun Empie, a leading NGINX Technical Solutions Architect, will cover how real world enterprises are addressing these challenges, plus review the NGINX Plus powered Microservices Reference Architecture (MRA), a microservices platform with 3 pre-developed models for microservices applications:- The Proxy Model puts a single NGINX Plus server in the reverse proxy position. From there, it can manage client traffic and control microservices.- The Router Mesh Model adds a second NGINX Plus server. The first server proxies traffic and the second server controls microservices functionality. – The Fabric Model is the most innovative. There’s still one NGINX Plus server in front, proxying traffic. But, instead of a second server to control the services, there’s one NGINX Plus instance per service instance. With its own instance of NGINX Plus, each service instance hosts its own service discovery, load balancing, security configuration, and other features. The Fabric Model allows SSL/TLS support for secure microservices communications with high performance, because individual NGINX Plus instances support robust persistent connections.1:40 – 2:00: OpenStack-based Management of Cloud Computing Platforms with Red HatIn 2004, Linux was a lot like OpenStack is today. Developers and technologists around the world now collaborate on OpenStack. to create tools for building and managing public and private clouds.While OpenStack's development, distribution, and adoption are overseen by the OpenStack Foundation, an independent body providing shared resources, this presentation will focus on RDO, a community deploying OpenStack on Red Hat Enterprise Linux, Fedora, and distributions derived from these (CentOS, Scientific Linux, and others).End of Event, Raffle Prize Drawings for gift cards and other great items!FAQsWhat are Angelbeat's privacy and optin/optout policiesEach attendee acknowledges/understands that financial support from Angelbeat sponsors allows him/her to attend this event at no cost, and that the sponsors will be given your contact information 2 days after the event for follow-up email and telephone communications. All sponsors are required to provide you with an opt-out option, allowing you to be removed from their databaseHowever each attendee can opt-out of sponsor follow-up by informing Angelbeat staff at the event, or by emailing Angelbeat immediately after the event, but before Angelbeat releases the attendee list to the event sponsors. If you have any questions regarding Angelbeat's privacy policies and how your contact information is used, please contact CEO Ron Gerber directly at 516-277-2057 or at rgerber@angelbeat.com.Who is eligible to receive a free passThere is no charge to attend for an end user IT professional who works in the telecom/network/storage/security/data center/desktop/purchasing departments of corporations (private and publicly-held, large and small), universities, school districts, government agencies, hospitals/healthcare providers, pharmaceuticals, insurers, manufacturers, retailers, financial services/banks, real estate, legal/accounting/services, transportation/logistic firms, etc. and use, support, approve and/or are involved in or influence the decision to buy the products and services offered by our sponsors.All free attendees must be pre-approved in advance by Angelbeat. Angelbeat reserves the right to accept or reject a free pass request at its sole discretion. As a general policy Angelbeat does not offer free passes to individuals at companies that are looking to sell their products/services to the end user personnel described above, who attend our events at no charge. If you fall in this category and would still like to attend then the fee is 0/person. To sign up please click here, complete the pdf document that appears and fax it back to Angelbeat at 703-783-8015. If you are a non-sponsoring vendor/integrator/consultant and would like to attend but avoid paying this 0 fee, then you must be accompanied by one of your clients who has not previously registered, and is a CIO, CISO or IT Director that meets the end user criteria above. Full-time reporters from major newspapers, websites, television and radio stations can attend as our guest, but again must be approved in advance.If you do not meet the above criteria and still try to register, then you will receive an automatic reply/confirmation from Eventbrite. However you will shortly receive another email from Angelbeat, rejecting and cancelling your registration.What are my transport/parking options getting to the eventDetailed driving directions will be sent out to all attendees one week before the event. There is complimentary self parking.What is the dress codeSuggested dress is business casual.What if you have special dietary needs/restrictionsIf you have special dietary needs/restrictions, then please email Angelbeat below. We will do our best to accommodate any and all requests.What if I am a government employee and cannot accept free meals and/or win raffle prizesIf you are a government employee and cannot accept free meals, then you can pay Angelbeat /person, to cover the cost of breakfast. Please contact the event organizer at registration@angelbeat.com to arrange payment.Each sponsoring company/exhibitor handles its own raffle prize drawing; Angelbeat itself has nothing to do with these prizes and attendees are not automatically entered for any raffle prize drawing. Since each attendee must individually signup to win a raffle prize, then government employees (who are not eligible to win these prizes) can simply not signup for the drawing.